Next Article in Journal
Evaluation of the Long-Term Reliability of Open-Tube Diffused Planar InGaAs/InP Avalanche Photodiodes under a Hybrid of Thermal and Electrical Stresses
Next Article in Special Issue
Cascade Parallel Random Forest Algorithm for Predicting Rice Diseases in Big Data Analysis
Previous Article in Journal
Resilient Consensus for Multi-Agent Systems in the Presence of Sybil Attacks
Previous Article in Special Issue
Two-Branch Attention Learning for Fine-Grained Class Incremental Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Impacts of GPS Spoofing on Path Planning of Unmanned Surface Ships

1
Navigation College, Dalian Maritime University, Dalian 116026, China
2
Department of Computer Science, The University of Alabama, Tuscaloosa, AL 35487, USA
3
Automation Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
4
Computer Science and Engineering, South China University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(5), 801; https://doi.org/10.3390/electronics11050801
Submission received: 18 January 2022 / Revised: 24 February 2022 / Accepted: 27 February 2022 / Published: 4 March 2022
(This article belongs to the Special Issue Advancements in Cross-Disciplinary AI: Theory and Application)

Abstract

:
The Artificial Potential Field (APF) method is a classical path planning method for unmanned ships, relying on Global Positioning System (GPS) positioning information for path planning. Unfortunately, once the path planning algorithm uses inaccurate or even fake data, it will lead to ship collision, grounding, or deviation from the course, causing severe economic losses and causing significant security risks to other sailing ships. This paper aims to study the impacts of GPS spoofing on the path planning of unmanned ships. We propose a GPS attack and study GPS spoofing of path planning based on the APF method for an unmanned ship by a low-cost software-defined radio, which causes the unmanned ship to deviate from the course. Our simulation tests show that this method has significant impacts on the path planning results of the APF method.

1. Introduction

Unmanned Surface Vehicles (USVs) are ships that operate on the water surface without a crew [1,2]. USVs have great advantages, including efficiency, cost-effectiveness, environmental friendliness, work safety, and family friendliness [3]. USVs navigate in complex water areas, including islands, shoals, reefs, and other obstacles [4]. Path planning for USVs is an important guarantee for safe navigation of USVs [5]. There are some path planning algorithms for USVs, including Artificial Potential Field (APF), A* algorithm, Ant Colony Algorithm (ACA), etc. [6,7]. The APF method is a classical path planning algorithm, which can plan a smooth and safe path for vehicle travel on the sea where both static and dynamic obstacles exist. We believe that this paper’s studies can also be applied to other methods in the field. Its core idea is to assume that an unmanned ship moves and is controlled by a resultant force under two virtual forces: a target point has “gravity” on the unmanned ship, and some obstacles have “repulsive force” on the unmanned ship [8,9]. Since this method has the problem of local optimum, many researchers have improved it [10,11,12,13,14]. The traditional APF method usually needs to calculate the resultant force of gravitational and repulsive forces on the ship according to the speed of its own ship, real-time position, and goal position. The improved APF method calculates the steering angle and heading based on its own ship’s position, target ship’s position, ship’s speed, target ships’ speed, ship’s heading, and target ships’ heading to avoid collision with dynamic ships. These data are obtained by Automatic Identification System (AIS), Global Positioning System (GPS), speed log, compass, and radar. After data fusion and calculation, paths are finally planned for unmanned ships. The papers [15,16] have introduced these data collection and path planning algorithms in detail.
The path planning results of unmanned ships based on the APF method are affected by GPS position data [17]. Unfortunately, the structure of civil GPS signals is public, which brings hidden trouble to the application of the APF method in path planning for unmanned ships. If the signals’ strength is weak, the attackers do not need to produce strong false signals to cover the authentic signals [18]. At present, the frequencies of GPS signals can be generated by existing commercial equipment. If the GPS receiver receives these fictitious GPS signals instead of the real GPS signals, it will harm the path planning and collision avoidance algorithm of unmanned ships, resulting in yaw, grounding, and even collision. Once hackers or attackers attack the GPS and AIS data received by unmanned ships, the use of inaccurate or even wrong data in the APF path planning algorithm will lead to ship collision, grounding, or deviation from the course, causing severe economic losses and significant security risks to other sailing ships.
In a GPS spoofing attack system, an attacker induces a GPS receiver to lock and capture false GPS signals so that the GPS receiver calculates a wrong position. There are two main approaches to GPS spoofing attacks. The first one is that attackers interfere with GPS receivers to track authentic signals by transmitting jamming signals so that GPS receivers can track and capture false GPS signals. If the power of the spoofing signals is 4 dB stronger than the authentic signals, the normal tracking of the authentic signals can be interrupted within 50 min [19]. Meanwhile, GPS receivers are induced to recapture and track the spoofing signals. The second approach is that the signals generated by GPS spoofers are initially almost wholly aligned with the authentic signals and are kept below the noise with low power. Then the attackers gradually make the power of the spoofing signals slightly stronger than the power of the authentic signals, and finally, they make the GPS receivers track the false GPS signals.
There are many papers in the literature studying the APF methods. The authors in [20] present a structure of repulsion potential for APF, adding a rotational avoidance force, which can effectively reduce oscillations and avoid conflict when the target is near obstacles. The authors in [21] propose a modified APF method, which introduces virtual target points and changes the repulsion field function to solve the problem of unreachable target points and local extreme points to avoid obstacles in real-time. To make the target reach the goal, avoid obstacles, and avoid the target getting stuck in the local minimum, the authors in [22] propose an improved APF method by looking for an appropriate cost function.
There are many papers studying GPS spoofing. The authors in [23] describe a series of attack methods based on GPS spoofing in detail. The authors in [24] study attackers using civil or military GPS receivers to spoof victims and determine the GPS spoofing parameters, such as position and signal accuracy. There are also some examples of GPS attacks. For instance, in June 2021, GPS attacks made a warship of the U.K. near a Russian naval base by mistake [25]. This incident fully shows that GPS attacks have significant impacts on ship navigation safety.
Attacks are almost in every cyber or physical related field [26]. Our research interests focus on attacks on ships and the functions of ships. The motivation of this paper is to systematically study the path planning of unmanned ships impacted by the security of GPS, implement the practical applications, and promote the research of the network security of unmanned ships. The research on the influence of GPS spoofing on path planning of artificial potential fields is beneficial for unmanned shipbuilders, researchers, and students. The contributions of this paper are listed as follows:
  • To the best of our knowledge, this is the first time the influence of GPS spoofing on the path planning of unmanned ships is researched using the artificial potential field method;
  • We study the security of GPS and propose a GPS attack using a low-cost software-defined radio, which can cause deviations to the result of path planning based on the artificial potential field method, leading to path yaw. Our simulation results show that this method can influence the path planning results of the artificial potential field method;
  • We study the feasibility of using low-cost and portable GPS spoofers to implement GPS spoofing and conduct a practical test.
The rest of this paper is organized as follows. Section 2 introduces the traditional and modified artificial potential field methods. Section 3 first describes the principle of GPS positioning and GPS spoofing attacks based on the APF method, and then proposes a feasible GPS spoofing attack scheme and analyzes the influence of GPS spoofing on the path planning results of unmanned ships based on the APF method. Section 4 presents experiments/simulations of a GPS spoofing attacker for the APF model of unmanned ships. Finally, we conclude this paper in Section 5.

2. Artificial Potential Field

2.1. Traditional Artificial Potential Field

The artificial Potential Field (APF) method is a virtual force method proposed by Khatib in 1986 [27]. In ship domain [28], let own ship (OS) denote the ship, which needs to use the APF method for path planning, and let TSs (target ships) denote the ships which are dynamic ships around the OS to be avoided. In the virtual potential field for ship path planning, obstacles are surrounded by repulsive potential fields to force the ship away, and attractive potential fields surround the goal to attract the ship, shown in Figure 1. Obstacles include dynamic TSs and static obstacles (i.e., island, rocky outcroppings, and shoals). The combined force on the ship is equal to the negative gradient of the total potential field. Under the combined force, the ship sails from a high potential field to a low potential field along the negative gradient direction, shown in Figure 2. F a t t , F r e p , and F is an attractive force from the goal, a repulsive force function from the obstacle, and the combined force of attraction and repulsion, respectively. Therefore, the traditional APF method can effectively implement obstacle avoidance and path planning of ships. The core idea of the APF method is to find the potential functions under the combined potential of attraction and repulsion. These functions can be represented by the following Equations (1)–(10), based on [27]:
U ( X ) = U a t t ( X ) + U r e p ( X ) ,
where U ( X ) , U a t t ( X ) , and U r e p ( X ) represent the artificial potential field, the attractive potential field, and the repulsive potential field, respectively; and X is the position of the OS. In addition, the attractive potential field U a t t ( X ) is written as
U a t t ( X ) = 1 2 ξ ρ 2 ( X , X g ) ,
where ξ is a positive scaling factor for the attractive potential and X g is the position of the goal; ρ ( X , X g ) is the distance of the two locations where ρ ( X , X g ) = X X g = ( x x g ) 2 + ( y y g ) 2 , X = ( x , y ) , and X g = ( x g , y g ) . We assume that there are N ( N j ) obstacles around the OS. Furthermore, the repulsive potential field of the jth obstacle ( o j ) can be written as:
U r e p j ( X ) = 1 2 η 1 ρ ( X , X o j ) 1 ρ 0 2 ρ ( X , X o j ) ρ 0 0 ρ ( X , X o j ) > ρ 0 ,
where η is a positive scaling factor for repulsive potential, ρ 0 is the distance threshold for an obstacle to create a repulsion effect on the OS. The selection of the distance ρ 0 V m a x / 2 D m a x will depend on the maximum speed ( V m a x ) and the maximum deceleration ability of the OS ( D m a x ). In a two-dimensional space, X = (x, y) is the coordinate of the OS, X o j = ( x o j , y o j ) is the coordinate of the jth obstacle, and ρ ( X , X o j ) = X o j X = ( x x o j ) 2 + ( y y o j ) 2 is the Euclidean distance between the OS and the jth obstacle. The total repulsive potential field of obstacles is the sum of the repulsive potential fields produced by all obstacles to OS, written as:
U r e p = j = 1 N U r e p j ( X ) ,
where N is the total number of all obstacles. The goal puts an attraction on the OS, attracts OS to approach gradually, and finally arrives. The obstacles repulse OS to avoid collisions. The derivatives of the attractive potential function and the repulsive potential functions are an attractive force function and the repulsive force functions, respectively, written as
F a t t ( X ) = U a t t ( X ) ,
U a t t ( X ) = ξ ( X X g ) ,
F r e p j ( X ) = U r e p j ( X ) ,
U r e p j ( X ) = η 1 ρ ( X , X o j ) 1 ρ 1 ρ 0 2 ρ ( X , X o j ) ρ 0 0 ρ ( X , X o j ) > ρ 0 ,
F r e p ( X ) = j = 1 N F r e p i ( X ) ,
where U a t t ( X ) and U r e p j ( X ) are the attractive gradient and the jth repulsive gradient function, respectively. F a t t ( X ) and F r e p j ( X ) are the attractive force and the jth repulsive force function, respectively. The sum of attraction and repulsion forces on the OS can be expressed simply as the sum of vectors:
F ( X ) = F a t t ( X ) + F r e p ( X ) .

2.2. Modified Artificial Potential Field (APF)

The traditional APF method has the advantages of simple calculation and effectivity. However, the traditional APF method has the problem of local minimum [29]. Meanwhile, APF for path planning of USV also needs to consider collision avoidance with dynamic TSs, static obstacles, and emergency. The authors [12] proposed a modified APF including the modified repulsion potential field function and the corresponding virtual force to solve the dynamic target collision avoidance. They subdivided the repulsive potential field function according to the requirements of International Regulations for Preventing Collisions at Sea (COLREGS), including dynamic TSs, static obstacles, emergencies, and others, which are shown in the equations based on [12]. This paper focuses on the introduction of APF for dynamic TSs, shown in Figure 3. We have
d m = R o s + d s a f e + R t s ,
where R t s and R o s are the ship domain radiuses of the OS and TS, respectively; d m is the sum of R t s , R o s , and the safe distance between OS and TS ( d s a f e ). We have
θ m = arctan d m ρ 2 ( p o s , p t s ) d m 2 ,
where θ m is the angle between the tangent line of the radius circle of d m and the vector of the OS to the TS. p t s , p o s , and p g are the position of the OS, the Ts, and the goal. ρ ( p o s , p t s ) is the Euclidean distance between the OS and the TS. According to the above equations, the modified attractive and repulsive potential function are shown in Equations (13) and (14).
U a t t ( p ) = 1 2 ξ ρ 2 ( p o s , p g ) ,
U r e p ( d , θ ) = η d R t s ( 1 d d m 1 ρ 0 ) 2 ( e θ m θ 1 ) d g 2 , v t s 0 , d m < d C R a n d θ < θ m 1 2 η s R t s ( 1 d τ 1 ρ 0 ) 2 d g 2 , v t s = 0 , d m < d C R a n d θ < θ m η e R t s ( 1 d τ 1 ρ 0 ) 2 + ( V t o cos θ ) 2 d g 2 , d d m n o t d e f i n e d , o t h e r s ,
where ρ 0 is the preset influence range of the TS and τ is the radius of an artificial safety margin of the OS. v t s and v o s are the speeds of TS and OS, respectively. θ is the angle between the vector p o t ( p t s p o s ) and the relative speed vector v t o ( v o s v t s ), and V t o = v o s 2 v t s 2 is the relative speed vector from the OS to the TS. d g = ρ ( p o s , p g ) , CR is the sum of d m and ρ 0 . η d , η s , and η e are the positive scaling factors for the dynamic the TSs, static obstacles, and emergency action, respectively. F a t t ( p ) is the attractive force in term of the position, shown in Equation (15). F r e p ( d , θ ) is repulsive force of the position and the velocities, shown in Equation (19).
F a t t ( p ) = U a t t ( p ) = ξ ρ ( p o s , p g ) ,
F r d = F r d 1 + F r d 2 + F r d 3 ,
F r s = F r s 1 + F r s 3 ,
F r e = F r e 1 + F r e 2 + F r e 3 ,
F r e p ( d , θ ) = F r d , v t s 0 , d m < d C R a n d θ < θ m F r s , v t s = 0 , d m < d C R a n d θ < θ m F r e , d d m n o t d e f i n e d , o t h e r s ,
where F r d 1 and F r d 3 are the repulsive force from the TS and the attractive force from the goal, respectively, when the obstacles are dynamic TSs. F r d 2 is the repulsive force to make the OS alter course to starboard for TS to meet COLREGS requirements. F r s 1 and F r s 3 are the repulsive force from the obstacle and the attractive force from the goal when the obstacles are static obstacles, respectively. For an emergency action, F r e 1 and F r e 3 are the repulsive force from the obstacles and the attractive force from the goal, respectively. F r e 2 makes the OS avoid collisions from the right or the left side of p o t according to which side of the p o t line the vector v t o is on. This modified APF calculates the steering angle ( ψ o s ), desired heading ( ψ o s ), and dynamic position ( p o s ) by inputting p t s , p o s , p g , v o s , v t s , R o s , R t s , d s a f e , ρ 0 , η d , η s , and η e .

3. GPS Attack Designs and Spoofing Analysis

In this section, we first introduce GPS and attacks on GPS. Then we design a GPS spoofing attack and analyze how the GPS spoofing influences the result of the path planning of unmanned ships based on the APF method in Section 2.

3.1. GPS Introduction

Global Positioning System (GPS) is a satellite navigation system, which provides position, navigation, and timing for land, sea, and air in the world [30]. Furthermore, a GPS is an important navigation device for an unmanned ship [31]. A GPS consists of three parts, including space, control, and a user device. The space part of aGPS consists of 27 GPS satellites (24 active and three standby). The GPS control part consists of one main control station, five detection stations, and three injection stations. The GPS user device part includes a GPS receiver and other devices. The basic principle of a GPS navigation system is to measure the distance between the satellite and the user’s receiver and calculate the receiver’s position by integrating the data of multiple satellites. The GPS signals include a carrier at L1 and L2, Pseudo Random Number (PRN) code at civil code (C/A) and military code (P-code), and navigation data. The GPS signals include raning codes and the navigation message, shown in Figure 4. The GPS system must modulate the ranging code and navigation information onto a carrier frequency before it can be transmitted to the receiver. The frequencies are utilized, including the L1 frequency at 1575.42 MHz and the L2 frequency at 1227.60 MHz. Coarse/Acquisition code (C/A code) is transmitted on the L1 frequency as 1.23 MHz signal. Precision code (P-code) is transmitted on both L1 and L2 frequencies as 10.23 MHz signal.
First of all, before we introduce a GPS attack, we need to understand the GPS working principle. Figure 5 shows how a GPS works. Based on [24], let D i , L, and L i denote the distance between the i-th satellite and the receiver, the location of the receiver, and the location of the i-th satellite, respectively. D i is expressed by Euclidean distance as follows:
D i = | L i L | ,
where L i = ( x i , y i , z i ) is the coordinate of satellite in Cartesian three-dimensional coordinate system. Similarly, L = ( x , y , z ) is the coordinate of the receiver. Equation (20) can be transformed into the following Equation (21):
D i = ( x x i ) 2 + ( y y i ) 2 + ( z z i ) 2 .
The receiver can separate transmission time ( T i s ) and location of the i-th satellite ( L i ) from the received GPS signals. Meanwhile, the receiver can acquire arrival time ( T r ) when receiving the GPS signal. GPS signal transmission speed (V) is close to the speed of light. D i can be expressed by T i s , T r and V as follows:
D i = ( T r T i s ) V ,
where T i s , T r , and V are known scalars. Combining Equations (21) and (22), we can know that the receiver location (L) can be calculated when at least three satellite signals are received. In geometric space, a satellite defines a transmission circle with radius D i . At least three of these circles intersect with the earth’s surface, where the receiver is located
In practice, the time between different satellites is synchronous, but the time of different types of receivers is not exact. We assume that δ is a clock offset between the receiver and exact GPS time system and T u is the arrival time of GPS signal measured under a common standard. We can get the following equation:
T u = T r + δ ,
D i = ( T r T i s ) V + δ V .
Based on the above, there are four unknown scalars, including δ , x, y, and z. Therefore, the receiver must receive more than four satellites’ signals to calculate the receiver’s exact location.

3.2. GPS Attacks

As we know, the signal structure, spread spectrum code, and modulation method of civilian GPS signals are public. Military GPS signals are encrypted. Therefore, civilian GPS signals are insecure and may be exploited by some attackers. We focus on GPS C/A code in this paper. GPS attacks are classified into jamming attacks and spoofing attacks.
  • A jamming attack happens when a GPS jammer transmits strong jamming signals at the same frequency, which suppress the front-end signal of the GPS receiver so that the GPS receiver loses the ability to work or receive attenuated satellite signals. Jamming attacks have the advantages of simple operation and easy implementation. However, the power required for a jamming signal is large;
  • A spoofing attack happens when a GPS spoofer transmits the same or similar signal as a GPS signal to guide the GPS receiver to deviate from the original correct navigation and positioning. Spoofing attacks have the advantages of strong concealment.
Next, we introduce GPS jamming and GPS spoofing in detail.

3.2.1. GPS Jamming

The GPS signals of satellites, measured at the surface of the earth, are very weak. According to IDC-GPS-200 [33], the transmitting power of the L1 signal only guarantees the minimum signal power level of −160 dBW on the earth surface and the minimum signal level of −166 dBW when the L2 signal strength reaches the earth surface. The experiment result of Lincoln Laboratory [34] shows that a jammer with a power of 1 W can make the receiver of C/A code within 85 km out of work. If the jamming power is increased by 6 dB, the jamming distance is doubled. Therefore, the GPS is vulnerable to jamming, resulting in difficulties in acquiring navigation data. GSP jamming technologies based on bandwidth ( B j ) is classified into three types, including Continuous Wave ( B c w ), Narrowband ( B n b ), and Wideband ( B w b ), where B c w < 100 kHz, 1 < B n b 1.023 kHz, B w b 10.23 MHz. The GPS signal acquisition is a search process to determine whether the satellite signals exist or not. Based on [35], the detection probability of GPS signal P d is proportional to the carrier to noise ratio C / N 0 . A jammer broadcasts on the same frequency to reduce C / N 0 , i.e., increasing noise ( N 0 ). Therefore, the victim receiver cannot acquire GPS signals normally. A simple GPS jamming system, including a power amplifier, an antenna of a GPS simulator, and an RF signal transmitter, can jam GPS receivers. Many papers have detailed introduction, such as [36,37,38].

3.2.2. GPS Spoofing

Compared with GPS jamming, GPS spoofing is more dangerous to ship navigation because it is surreptitious [32]. An attacker makes the receiver believe that it is at the wrong location. It is a very dangerous situation for the path planning of USV based on APF. GPS spoofing is classified into production spoofing and repeater. GPS production spoofing refers to the receiver-spoofer generating spoofing signal, Pseudo Random Number (PRN), and navigation message, which the victim GPS receiver can receive. GPS repeater spoofing refers to the spoofer modifying, modulating, and amplifying the received GPS signal or sending it out after a delay. The production spoofing for C/A is possible because C/A signals are public and not authenticated, but it is difficult for P-code. Based on [39], we can know the composite signal received at the antenna of a GPS receiver is S a n t = S a + S s + S n , where S a , S s , and S n are the authentic signal, spoofing signal, and noise signal, respectively. When S s S a , the signal received at the antenna of GPS receiver can be approximated by S a n t S s + S n . The spoofing signals generated by the GPS spoofer successfully override the authentic GPS signals. The attacker can transmit its GPS signals using the publicly known GPS parameters by a simple GPS generator. Although this approach can spoof the receiver, the spoof signals look like noise to the receiver [40].
Next, we focus on GPS repeater spoofing. The attacker can delay and modify the content of received GPS signals to spoof the victim GPS receiver into calculating a false location, such as a receiver-spoofer designed by Humphries [41], as shown in Figure 6 and Figure 7. Based on Equation (28) in Section 3.1, if the attacker changes the arrival time of GPS signals ( T u ) by delaying the transmission of received signals, it will eventually lead to an inaccurate receiver position. On the other hand, if the attacker changes the content of GPS (i.e., transmission time or location of the satellite) according to its intention, the ship which depends on GPS for path planning navigates to the position set by the attacker, causing a greater danger. The paper [40] introduces that the Cornell GRID receiver can simultaneously track 12 C/A channels and generate 8 C/A spoofing channels. Such equipment coupled with the simple RF hardware can implement GPS spoofing. In case of GPS spoofing or signal loss, the speed information obtained by the Inertial Navigation System (INS) is used to assist the GPS receiver tracking loop in implementing navigation and positioning functions. The INS is a technology used to obtain instantaneous velocity and instantaneous position data by measuring acceleration and automatic integration operation, one of the key equipment for ships. When the GPS is combined with the INS, it can still complete the output of position and speed in the face of GPS jamming. However, in the face of GPS spoofing, it will lead to the divergence of the GPS/INS navigation system and destroy the overall performance of the integrated navigation system. The integrated navigation system supervises the GPS during unmanned ships’ navigation. When there is a difference between the position information calculated from the GPS and the position information estimated from INS according to the previous time, the integrated system will suspect that the GPS signal has been spoofed. Therefore, in GPS spoofing, it is necessary to gradually induce the unmanned ships to deviate from the course step by step. Lidar and navigation radar are the main means of ship obstacle avoidance detection. Similarly, GPS spoofing will affect the path planning after multi-source data fusion from lidar, radar, and sensors.

3.2.3. Designing a GPS Attack

We design a GPS spoofing attack on a single GPS receiver, which can be seen in Figure 8. We assume that the attacker uses a GPS spoofer to attack a victim’s GPS receiver. P = ( x , y , z ) , P A , and δ A are the physical location of the receiver, the physical location of the attacker, and the transmission time offset of the attacker, respectively. From the attackers’ perspective, the expected pseudo-range ( R A ) that the receiver in location P calculates based on the attacker’s signals is as follows.
R A = | P P A | + δ A V .
In the perspective of the receivers, the pseudo-range (R ) is calculated according to the signals of impersonated satellite location (L ), the time offset ( δ ), and receivers location determined by an attacker (L) as follows.
R = | L L | + δ V .
At the same time, the pseudo-range (R ) can be calculated by transmission (T s ) and the receiving time (T r ) of GPS spoofing signals as follows.
R = ( T r T s ) V + δ V = | L L | + δ V .
If the attacker (A) wants to spoof the GPS receiver (G) successfully, this requires R A = R .
| P P A |   +   δ A V = | L L | + δ V .
In the term of the attack on GPS C/A, the attacker can set the location of satellite L s = ( x s , y s , z s ) and the physical location of the attacker P 0 = ( x 0 , y 0 , z 0 ) in advance. The attacker brings L = L s and P A = P 0 into Equation (32) to solve for δ , and δ = δ .

3.3. Spoofing Analysis

Next, we analyze how the above GPS spoofing influences the result of the path planning of unmanned ships based on the APF method in Section 2. As we see in the above subsections, GPS signals received by the GPS receiver of an unmanned ship is determined by the attacker, conducting a GPS spoofing attack on the unmanned ship. We take an obstacle as an example to explain the influence of GPS deception on the path planning results of the APF method. Let X = ( x , y ) denote the physical position of the unmanned ship, X 1 = ( x 1 , y 1 ) denote the obstacle coordinates, X g = ( x g , y g ) denote the goal coordinate, ξ denote the positive scaling factor for attractive potential, and η denote the positive scaling factor for repulsive potential. The GPS receiver of the unmanned ship receives the GPS data of the ship, i.e., X = X + δ = (x + δ x , y + δ y ). Additionally, δ is the position offset added by attackers during GPS spoofing. In conclusion, the Equations (2)–(10) of the artificial potential field method in Section 2 is changed into the following Equations (29)–(34). In the case of GPS spoofing, the attractive potential field U a t t (X ) is rewritten as:
U a t t ( X ) = 1 2 ξ ( X + δ X g ) 2 ,
U a t t ( X ) = 1 2 ξ ( x + δ x x g ) 2 + ( y + δ y y g ) 2 .
Next, we analyze the change of the repulsive potential field in the case of GPS spoofing. When the distance between the OS and the obstacle is less than or equal to the influence radius ( ρ 0 ) of the repulsion force generated by the obstacle, the repulsive potential field of the obstacle can be written as:
U r e p 1 ( X ) = 1 2 η 1 ( x + δ x x 1 ) 2 + ( y + δ y y 1 ) 2 1 ρ 0 2 .
When the distance between the OS and the obstacle exceeds the radius of influence ( ρ 0 ) of the repulsion force generated by the obstacle, we think that the repulsive potential field of the obstacle is 0. We superimpose attractive potential field and repulsive potential field to form artificial potential field U ( X ) , and the equation is shown as follows.
U ( X ) = U a t t ( X ) + U r e p 1 ( X ) .
As we know, the path planning of the artificial potential field method is to move forward along the negative gradient direction from the current position until the gradient is 0. The derivatives of the attractive potential function and repulsive potential function are attractive force function and repulsive force function, which can be written as:
F a t t ( X ) = U a t t ( X ) ,
F r e p 1 ( X ) = U r e p 1 ( X ) .
According to Equation (34), assuming that x and y are from 0 to 10, the step is 0.1, δ is from 0 to 10, the step is 0.1, the coordinate of goal X g = (10, 10), the coordinate of obstacle X o 1 = (4, 8), the attraction gain ξ = 50, the repulsive gain η = 15, and the influence distance of obstacles ρ 0 = 0.4, we can get the curve of the influence of δ change rate on U a t t , as shown in Figure 9. Similarly, according to Equation (35), the curve of delta change rate on U r e p 1 can be obtained, as shown in Figure 10. The influence of δ change rate on the resultant force of attraction and repulsion is shown in Figure 11.

4. Experiments

To verify the feasibility and practical effect of GPS spoofing on the APF method in the previous section, we first use HackRF ONE as a GPS spoofer to simulate GPS spoofing, as shown in Figure 12. Then we use GPS spoofing data to simulate the path planning of the APF method. The hardware system of the GPS spoofing test includes HackRF ONE, GPS external clock, and a 700–2700 Mhz antenna, as shown in Figure 13. The software platform is Ubuntu 64 bit (18.04), and the GPS receiving terminal is Xiaomi 6 mobile phone, as shown in Table 1. We use Matlab to simulate the path planning of the APF method to test the influence of GPS spoofing on path planning.

4.1. GPS Spoofing Simulation

We use GPS-SDR-SIM as a GPS signal generator code, which can produce spoofing GPS signals. GPS-SDR-SIM is an open-source GPS generator project. To make it easier for readers to understand GPS spoofing, we introduce the process of GPS spoofing step by step. We download and compile the GPS simulator code from GitHub, as shown in Figure 14. Then, we can generate GPS longitude and latitude information that we want to spoof through online tools and generate GPS simulation data through GPS simulator according to this longitude and latitude information, as shown in Figure 15. Among them, 31.60321167 and 120.4666667 are the GPS longitude and latitude of spoofing to be transmitted to the GPS receiver. After the execution of the above command, the gpssim.bin file is generated, which saves the GPS spoofing data generated by the simulation code, as shown in Figure 16. The GPS test app for mobile phones is GPS Test Plus. Before starting the GPS spoofing attack, open the app of GPS Test Plus and check the physical position of the mobile phone, as shown in Figure 17.
We connect HackRF ONE to the computer with USB and test whether the host installation is successful in the shell terminal of Ubuntu, as shown in Figure 18, which proves that the hardware system of HackRF ONE has been successfully connected to the computer. HackRF ONE is a full open-source hardware and software project that can provide Software Defined Radio (SDR) solutions. The wireless communication protocol based on software definition can replace the hardware connection so that the frequency band, air interface protocol, and function can be upgraded through software download and update without replacing the hardware. We use HackRF ONE to transmit the fake GPS data we simulated above, as shown in Figure 19. After waiting for 3–4 min, we open the app of GPS Test Plus and find that the mobile phone position has been changed to a fake GPS spoofing position, as shown in Figure 20.

4.2. APF Simulation

We use Matlab to simulate the path planning of the unmanned ship using the APF method, as shown in Figure 21. The algorithm needs to set the start position, goal position, obstacle position, gravity and repulsion gain coefficient, obstacle influence distance, step, and iteration times.
The purpose of a GPS spoofing attack based on the APF method is to cause lateral deviation in the position of the ship’s navigation trajectory so that the ship deviates from the original path planning, as shown in Figure 22.
We take a practical example to illustrate the harm of GPS spoofing to unmanned ships using the APF method for path planning. Without the repulsive force of obstacles, we assume that the physical location of OS x = ( 0 , 0 ) , the false location of OS x = ( 2 , 0 ) , the goal location x g = ( 5 , 5 ) , and the step is 1, shown as in Figure 23. Without GPS spoofing, the next position of OS based on APF is x 1 = ( 1 2 , 1 2 ) . Under GPS spoofing, the next position of OS based on APF is x 1 = ( 3 3 4 , 5 3 4 ) . In conclusion, GPS spoofing can cause the yaw of unmanned ships using the APF method for path planning.
In the environment of both attraction of goal and repulsion of an obstacle, the attacker can influence the result of path planning based on the APF method through GPS spoofing. We use a practical example to illustrate the influence of GPS spoofing on path planning results by the APF method. In the Cartesian coordinates, we assume that x g = (10, 10) is position of the goal, x = (0, 0) is the initial position of OS, x o 1 = ( 4 , 8 ) and x o 2 = ( 1 5 , 1 5 ) are the positions of the first obstacle and the second obstacle, respectively. k = 50 and m = 15 are the attraction gain and the repulsive gain, respectively, l = 0.2 is the step length of OS. ρ 0 = 0.5 is the influence distance of obstacles. When the distance between the obstacles and OS is greater than this distance ρ 0 , the repulsion force is 0. θ 0 is the angle between the line from the position of OS (x) to the goal ( x g ) and the x-axis, θ 1 is the angle between the line from the position of OS to the first obstacle ( x o 1 ) and the x-axis, θ 2 is the angle between the line from the position of OS to the second obstacle ( x o 2 ) and the x-axis. First of all, we calculate the values of θ 0 , θ 1 , and θ 2 according to the following formulas.
θ 0 = arccos 10 0 ( 10 0 ) 2 + ( 10 0 ) 2 = arccos ( 2 2 ) ,
θ 1 = arccos 4 0 ( 4 0 ) 2 + ( 8 0 ) 2 = arccos ( 5 5 ) ,
θ 2 = arccos 1 5 0 ( 1 5 0 ) 2 + ( 1 5 0 ) 2 = arccos ( 2 2 ) .
We assume that F a t t x and F a t t y are the components of the attraction of the goal on the OS in the x and y directions. We calculate the x and y-axis components of the attraction of goal on the OS as follows.
F a t t x = k ( 10 0 ) 2 + ( 10 0 ) 2 cos ( θ 0 ) = 500
F a t t y = k ( 10 0 ) 2 + ( 10 0 ) 2 sin ( θ 0 ) = 500
F r e p 1 and F r e p 2 are the repulsive forces of the first and second obstacles for the OS, respectively. F r e p x 1 , F r e p y 1 , F r e p x 2 and F r e p y 2 are the components of the repulsive force on the x and y axes, respectively. F s u m x and F s u m y are the resultant forces in the x and y directions, respectively. θ s u m is the angle between the resultant force and the x-axis. Since the distance between OS and the first obstacle is greater than ρ 0 , the repulsive force of the obstacle on the OS is 0. We calculate the repulsive forces of the second obstacle on the OS as follows.
F r e p 1 = 0 ,
F r e p 2 = m 1 ( 1 5 0 ) 2 + ( 1 5 0 ) 2 1 ρ 0 = 45 .
We calculate the components of the repulsive force of the obstacles on the OS in the x and y directions as follows.
F r e p x 1 = 0 ,
F r e p y 1 = 0 ,
F r e p x 2 = F r e p 2 cos ( θ 2 ) = 32 ,
F r e p y 2 = F r e p 2 sin ( θ 2 ) = 32 .
The resultant forces in the x and y directions are as follows.
F s u m x = F a t t x + F r e p x 1 + F r e p x 2 = 532 ,
F s u m y = F a t t y + F r e p y 1 + F r e p y 2 = 532 ,
θ s u m = arctan F s u m y F s u m x = 0.785 .
We calculate the next position p n e x t ( p n e x t x , p n e x t y ) in the path planning of OS as follows.
p n e x t x = 0 + l cos ( θ s u m ) = 0.14 ,
p n e x t y = 0 + l sin ( θ s u m ) = 0.14 .
According to the above formulas, if the position of OS is X = ( 0 , 0 ) , the next position of OS calculated by the APF algorithm is p n e x t = ( 0.14 , 0.14 ) . If the attackers change the position of OS by the GPS spoofing, we find that the next position of path planning results of OS will be changed, shown in Table 2. By analyzing these data, we can see that the farther the false position is from the physical position, the greater the coordinate change of the next position of OS. To prevent GPS spoofing from being found, the false position needs to be as close to the physical location of OS as possible and changes continuously with time.

5. Conclusions

At present, the research on path planning of unmanned ships assumes that the data from GPS receivers are reliable. However, the security and authenticity of the data collected by the front end of the unmanned ship are very important. Once the path planning algorithm uses inaccurate or even false data, it will lead to ship collision, grounding, or deviation from the course, causing serious economic losses and causing great security risks to other sailing ships. This paper designs a method where attackers transmit the fake position of ships through GPS spoofing to influence path planning based on APF. Experiments have studied and verified the feasibility of using a simple and economical GPS spoofing device to implement GPS spoofing. The experiments in this paper show that GPS spoofing for path planning of unmanned ships based on the artificial potential field algorithms is feasible without the interference of other factors. Finally, attackers make unmanned ships deviate from the target point through GPS spoofing.
This paper mainly focuses on the impacts of GPS spoofing on the path planning of unmanned ships. At present, there are few papers on the impacts of GPS spoofing on the path planning of unmanned ships. Moreover, there are no large-scale practical application examples of unmanned ships. Limited by the experimental environment and conditions, we cannot test the impacts of GPS spoofing on real unmanned ships since modifying the GPS signal for such ships is very dangerous. We could not get permission to conduct such an experiment even through our organization’s own ships. According to the GPS spoofing steps proposed in this paper, we test the GPS transmitting and receiving devices through experiments. It can be verified that the GPS spoofing method in this paper can also be implemented on real unmanned ships.
Unmanned ships have great advantages in economy, safety, and society, including reducing the operation cost of the ship owner, reducing the cost of personnel on board, reducing the loss caused by human error risk, and reducing the threat of pirates to the personal safety of the crew. In the future, unmanned ships will play an important role in maritime cargo transportation and the military field. There are many sensors and electronic devices on the unmanned ship to collect the dynamic data of navigation and environment, which need to be transmitted to the shore-based control center through communication networks. There may be data delay and packet loss in network transmission, which will affect the real-time monitoring and remote control of the shore-based control center. Moreover, many sensors and electronic devices with open communication protocols, unified standards, and a lack of effective security protection are deployed on unmanned ships, which will bring more potential network attacks and increase the possibility of network attacks on unmanned ship systems. Once an unmanned ship is attacked by the network or the network security management is improper, the shipowners, port operators, and their insurance companies will face a great risk of loss, such as ship collision, grounding, or deviation from the course, which will not only cause serious economic losses but also cause security risks to other ships. Therefore, the network security of unmanned ships is very important for the development of unmanned ships. Finding these security vulnerabilities and problems can be targeted to study the corresponding detection and defense strategies to minimize the loss. Additionally, we will consider inertial navigation systems and means of monitoring and measuring the distance to obstacles as our future work.

Author Contributions

J.W.: performed the experiment and wrote the manuscript; Y.X.: supervised the first author’s work and contributed to the conception of the study, drafting the work, and revising it critically for important intellectual content; T.L.: contributed significantly to analysis and manuscript preparation; C.L.P.C.: contributed significantly to analysis and manuscript preparation. All authors have read and agreed to the published version of the manuscript.

Funding

Jia Wang and Tieshan Li’s work is supported in part by the National Natural Science Foundation of China (under Grant Nos. 51939001, 61976033); the Liaoning Revitalization Talents Program (under Grant No. XLYC1908018); the Natural Science Foundation of Liaoning (2019-ZD-0151).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wikipedia. Unmanned Surface Vehicle. Available online: https://en.wikipedia.org/wiki/Unmanned_surface_vehicle (accessed on 16 November 2020).
  2. Gao, X.; Li, T.; Shan, Q.; Xiao, Y.; Yuan, L.; Liu, Y. Online optimal control for dynamic positioning of vessels via time-based adaptive dynamic programming. J. Ambient. Intell. Humaniz. Comput. 2019, 1–13. [Google Scholar] [CrossRef]
  3. Rødseth, Ø.J.; Burmeister, H.C. Developments toward the unmanned ship. Proc. Int. Symp. Inf. Ships–ISIS 2012, 201, 30–31. [Google Scholar]
  4. Yang, Y.; Xiao, Y.; Li, T. A Survey of Autonomous Underwater Vehicle Formation: Performance, Formation Control, and Communication Capability. IEEE Commun. Surv. Tutor. 2021, 23, 815–841. [Google Scholar] [CrossRef]
  5. Kim, J.; Kim, S.; Choo, Y. Stealth path planning for a high speedtorpedo-shaped autonomous underwater vehicle to approach a target ship. Cyber-Phys. Syst. 2018, 4, 1–16. [Google Scholar] [CrossRef]
  6. Wang, J.; Xiao, Y.; Li, T.; Chen, C.P. A Survey of Technologies for Unmanned Merchant Ships. IEEE Access 2020, 8, 224461–224486. [Google Scholar] [CrossRef]
  7. Li, M.; Li, T.; Gao, X.; Shan, Q.; Chen, C.L.P.; Xiao, Y. Adaptive NN Event-triggered Control for Path Following of Underactuated Vessels with Finite-time Convergence. Neurocomputing 2020, 379, 203–213. [Google Scholar] [CrossRef]
  8. Jun, W.; Haoyang, G. Virtual force field coverage algorithms forwireless sensor networks in water environments. Int. J. Sens. Netw. 2020, 32, 174–181. [Google Scholar] [CrossRef]
  9. Shi, Q.; Li, T.; Li, J.; Chen, C.P.; Xiao, Y.; Shan, Q. Adaptive Leader-following Formation Control with Collision Avoidance for a Class of Second-order Nonlinear Multi-agent Systems. Neurocomputing 2019, 350, 282–290. [Google Scholar] [CrossRef]
  10. Xie, S.; Wu, P.; Peng, Y.; Luo, J.; Qu, D.; Li, Q.; Gu, J. The obstacle avoidance planning of USV based on improved artificial potential field. In Proceedings of the 2014 IEEE International Conference on Information and Automation (ICIA), Hailar, Hulun Buir, China, 28–30 July 2014; pp. 746–751. [Google Scholar]
  11. Lyu, H.; Yin, Y. Ship’s trajectory planning for collision avoidance at sea based on modified artificial potential field. In Proceedings of the 2017 2nd International conference on robotics and automation engineering (ICRAE), Shanghai, China, 29–31 December 2017; pp. 351–357. [Google Scholar]
  12. Lyu, H.G.; Yin, Y. COLREGS-constrained real-time path planning for autonomous ships using modified artificial potential fields. J. Navig. 2019, 72, 588–608. [Google Scholar] [CrossRef]
  13. Zhang, R.; Wen, N.; Yu, H.; Wang, L.; Wu, J.; Liu, G. USVs Cooperative Collision Avoidance Based on Man–Machine Interaction and the Artificial Potential Field Method. In Proceedings of the 2019 Chinese Automation Congress (CAC), Hangzhou, China, 22–24 November 2019; pp. 1552–1557. [Google Scholar]
  14. Yuan, L.; Li, T.; Tong, S.; Xiao, Y.; Shan, Q. Broad Learning System Approximation-Based Adaptive Optimal Control for Unknown Discrete-Time Nonlinear Systems. IEEE Trans. Syst. Man Cybern. Syst. 2021, 1–11. [Google Scholar] [CrossRef]
  15. Yu, K.; Liang, X.F.; Li, M.Z.; Chen, Z.; Yao, Y.L.; Li, X.; Zhao, Z.X.; Teng, Y. USV path planning method with velocity variation and global optimisation based on AIS service platform. Ocean. Eng. 2021, 236, 109560. [Google Scholar] [CrossRef]
  16. Zhang, D.; Zhang, Y.; Zhang, C. Data mining approach for automatic ship-route design for coastal seas using AIS trajectory clustering analysis. Ocean. Eng. 2021, 236, 109535. [Google Scholar] [CrossRef]
  17. Yang, Y.; Xiao, Y.; Li, T. Attacks on Formation Control for Multi-agent Systems. IEEE Trans. Cybern. 2021, 1–13. [Google Scholar] [CrossRef]
  18. Wang, Y.; Zhang, S.; Zhang, Y.; Wan, P.; Wang, S. A cooperative spectrum sensing method based on signal decomposition and K-medoids algorithm. Int. J. Sens. Netw. 2019, 20, 171–180. [Google Scholar] [CrossRef]
  19. Huang, L.; Lv, Z.; Wang, F. Research on Deception Jamming for Satellite Navigation Receiver. J. Astronaut. 2012, 33, 884–890. [Google Scholar]
  20. Sfeir, J.; Saad, M.; Saliah-Hassane, H. An improved artificial potential field approach to real-time mobile robot path planning in an unknown environment. In Proceedings of the 2011 IEEE international symposium on robotic and sensors environments (ROSE), Montreal, QC, Canada, 17–18 September 2011; pp. 208–213. [Google Scholar]
  21. Yu, Z.Z.; Yan, J.H.; Zhao, J.; Chen, Z.F.; Zhu, Y.H. Mobile robot path planning based on improved artificial potential field method. Harbin Gongye Daxue Xuebao (J. Harbin Inst. Technol.) 2011, 43, 50–55. [Google Scholar]
  22. Rostami, S.M.H.; Sangaiah, A.K.; Wang, J.; Liu, X. Obstacle avoidance of mobile robots using modified artificial potential field algorithm. Eurasip J. Wirel. Commun. Netw. 2019, 2019, 1–19. [Google Scholar] [CrossRef] [Green Version]
  23. Psiaki, M.L.; Humphreys, T.E. GNSS spoofing and detection. Proc. IEEE 2016, 104, 1258–1270. [Google Scholar] [CrossRef]
  24. Tippenhauer, N.O.; Pöpper, C.; Rasmussen, K.B.; Capkun, S. On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 14–21 October 2011; pp. 75–86. [Google Scholar]
  25. Hambling, D. GPS Cyberattack Falsely Placed UK Warship Near Russian Naval Base. Available online: https://www.newscientist.com/article/2282149-gps-cyberattack-falsely-placed-uk-warship-near-russian-naval-base/ (accessed on 30 July 2021).
  26. Cheng, H.; Liu, J.; Xu, T.; Ren, B.; Mao, J.; Zhang, W. Machine learning based low-rateDDoS attack detection for SDN enabled IoT networks. Int. J. Sens. Netw. 2020, 34, 56–69. [Google Scholar] [CrossRef]
  27. Khatib, O. Real-time obstacle avoidance for manipulators and mobile robots. In Proceedings of the 1985 IEEE International Conference on Robotics and Automation, St. Louis, MO, USA, 25–28 March 1985; Volume 2, pp. 500–505. [Google Scholar]
  28. Goodwin, E.M. A Statistical Study of Ship Domains. J. Navig. 1973, 28, 328–344. [Google Scholar] [CrossRef] [Green Version]
  29. Sgorbissa, A.; Zaccaria, R. Planning and obstacle avoidance in mobile robotics. Robot. Auton. Syst. 2012, 60, 628–638. [Google Scholar] [CrossRef]
  30. Volpe, J.A. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System. Available online: http://www.navcen.uscg.gov/ (accessed on 10 August 2021).
  31. Ullah, I.; Bizzat Hussain, S.N.; Khan, U.; Ali, M.; Manzoor, S. An Inertial and Global Positioning System based Algorithm for Ownship Navigation. Int. J. Sens. Netw. 2021, 37, 209–218. [Google Scholar] [CrossRef]
  32. Warner, J.S.; Johnston, R.G. GPS spoofing countermeasures. Homel. Secur. J. 2003, 25, 19–27. [Google Scholar]
  33. Fyfe, P.; Kovach, K. Navstar GPS Space Segment/Navigation User Interfaces (Public Release Version); Technical Report; Research Corp Fountain: Valley, CA, USA, 1991. [Google Scholar]
  34. Gilmore, S.; Delaney, W. Jamming of GPS Receivers: A Stylized Analysis; Project Report; Lincoln Laboratory: Lexington, MA, USA, 1994. [Google Scholar]
  35. Dou, Y.; Zhang, W.; Chen, J. Analysis of Anti-interference performance of GPS receiver. Ordnance Ind. Autom. 2006, 25, 50–52. [Google Scholar]
  36. Rash, G.D. GPS jamming in a laboratory environment. In Proceedings of the 53rd Annual Meeting of the ION, Albuquerque, NM, USA, 30 June–2 July 1997. [Google Scholar]
  37. Grant, A.; Williams, P.; Ward, N.; Basker, S. GPS jamming and the impact on maritime navigation. J. Navig. 2009, 62, 173–187. [Google Scholar] [CrossRef] [Green Version]
  38. Iyidir, B.; Ozkazanc, Y. Jamming of GPS receivers. In Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, Kusadasi, Turkey, 30–30 April 2004; pp. 747–750. [Google Scholar]
  39. Wen, H.; Huang, P.Y.R.; Dyer, J.; Archinal, A.; Fagan, J. Countermeasures for GPS signal spoofing. In Proceedings of the 18th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2005), Long Beach, CA, USA, 13–16 September 2005; Volume 5, pp. 13–16. [Google Scholar]
  40. Montgomery, P.Y. Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In Radionavigation Laboratory Conference Proceedings; Disney’s Paradise Pier Hotel: Anaheim, CA, USA, 2011. [Google Scholar]
  41. Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O’Hanlon, B.W.; Kintner, P.M. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation Laboratory Conference Proceedings; Savannah International Convention Center: Savannah, GA, USA, 2008. [Google Scholar]
Figure 1. Diagram of traditional artificial potential field method [27].
Figure 1. Diagram of traditional artificial potential field method [27].
Electronics 11 00801 g001
Figure 2. The force diagram of the OS In traditional artificial potential field [27].
Figure 2. The force diagram of the OS In traditional artificial potential field [27].
Electronics 11 00801 g002
Figure 3. Modified APF for a dynamic TS [12].
Figure 3. Modified APF for a dynamic TS [12].
Electronics 11 00801 g003
Figure 4. GPS signal structure.
Figure 4. GPS signal structure.
Electronics 11 00801 g004
Figure 5. GPS working principle [32].
Figure 5. GPS working principle [32].
Electronics 11 00801 g005
Figure 6. A Spoofing attack via a portable receiver-spoofer [41].
Figure 6. A Spoofing attack via a portable receiver-spoofer [41].
Electronics 11 00801 g006
Figure 7. The architecture of a receiver-spoofer [41].
Figure 7. The architecture of a receiver-spoofer [41].
Electronics 11 00801 g007
Figure 8. Perspective of attackers and receivers.
Figure 8. Perspective of attackers and receivers.
Electronics 11 00801 g008
Figure 9. The influence of δ change rate on U a t t .
Figure 9. The influence of δ change rate on U a t t .
Electronics 11 00801 g009
Figure 10. The influence of δ change rate on U r e p 1 .
Figure 10. The influence of δ change rate on U r e p 1 .
Electronics 11 00801 g010
Figure 11. The influence of δ change rate on the resultant force of attraction and repulsion.
Figure 11. The influence of δ change rate on the resultant force of attraction and repulsion.
Electronics 11 00801 g011
Figure 12. A simple GPS spoofer.
Figure 12. A simple GPS spoofer.
Electronics 11 00801 g012
Figure 13. The test system of the hardware.
Figure 13. The test system of the hardware.
Electronics 11 00801 g013
Figure 14. GPS-SDR-SIM download and compile.
Figure 14. GPS-SDR-SIM download and compile.
Electronics 11 00801 g014
Figure 15. GPS spoofing location.
Figure 15. GPS spoofing location.
Electronics 11 00801 g015
Figure 16. Generation of GPS spoofing data.
Figure 16. Generation of GPS spoofing data.
Electronics 11 00801 g016
Figure 17. Physical position of test mobile phone.
Figure 17. Physical position of test mobile phone.
Electronics 11 00801 g017
Figure 18. Test whether the host is installed successfully.
Figure 18. Test whether the host is installed successfully.
Electronics 11 00801 g018
Figure 19. The fake GPS data transmission.
Figure 19. The fake GPS data transmission.
Electronics 11 00801 g019
Figure 20. Spoofing position of test mobile phone.
Figure 20. Spoofing position of test mobile phone.
Electronics 11 00801 g020
Figure 21. The simulation of path planning of APF.
Figure 21. The simulation of path planning of APF.
Electronics 11 00801 g021
Figure 22. Comparison of path planning simulation before and after GPS spoofing attack based on APF.
Figure 22. Comparison of path planning simulation before and after GPS spoofing attack based on APF.
Electronics 11 00801 g022
Figure 23. An APF example.
Figure 23. An APF example.
Electronics 11 00801 g023
Table 1. Experimental environment of GPS spoofing.
Table 1. Experimental environment of GPS spoofing.
ItemValue
HardwareHackRF ONE
Operation SystemUbantu 64 bit
NetworkChina Mobile LTE, China Unicom LTE
Antenna700–2700 MHZ
ClockGPS external clock
GPS ReceiverXiaomi 6 mobile phone
Test AppGPS Test Plus 1.5.3
Table 2. Data relationship between false positions and next positions of OS.
Table 2. Data relationship between false positions and next positions of OS.
False Position xFalse Position yNext Position xNext Position yx Offsety Offset
0.100.13850.14430.00150.0043
0.200.13370.14870.00630.0087
0.300.13200.15030.00800.0103
0.400.13360.14880.00640.0088
0.500.13530.14730.00470.0073
0.600.13630.14640.00370.0064
0.700.13660.14610.00340.0061
0.800.13660.14600.00340.0060
0.900.13640.14620.00360.0062
100.13610.14660.00390.0066
00.10.14170.14120.00170.0012
00.20.14260.14020.00260.0002
00.30.14370.13910.00370.0009
00.40.14490.13790.00490.0021
00.50.14600.13670.00600.0033
00.60.14700.13560.00700.0044
00.70.14800.13450.00800.0055
00.80.14900.13340.00900.0066
00.90.14990.13230.00990.0077
100.13610.14660.00390.0066
200.12930.15260.01070.0126
300.12020.15990.01980.0199
400.10940.16740.03060.0274
500.09700.17490.04300.0349
600.08290.18200.05710.0420
700.06710.18840.07290.0484
800.04970.19370.09030.0537
900.03100.19760.10900.0576
1000.01140.19970.12860.0597
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, J.; Xiao, Y.; Li, T.; Chen, C.L.P. Impacts of GPS Spoofing on Path Planning of Unmanned Surface Ships. Electronics 2022, 11, 801. https://doi.org/10.3390/electronics11050801

AMA Style

Wang J, Xiao Y, Li T, Chen CLP. Impacts of GPS Spoofing on Path Planning of Unmanned Surface Ships. Electronics. 2022; 11(5):801. https://doi.org/10.3390/electronics11050801

Chicago/Turabian Style

Wang, Jia, Yang Xiao, Tieshan Li, and C. L. Philip Chen. 2022. "Impacts of GPS Spoofing on Path Planning of Unmanned Surface Ships" Electronics 11, no. 5: 801. https://doi.org/10.3390/electronics11050801

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop